ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1908.02203
  4. Cited By
Model Agnostic Defence against Backdoor Attacks in Machine Learning
v1v2v3 (latest)

Model Agnostic Defence against Backdoor Attacks in Machine Learning

IEEE Transactions on Reliability (IEEE Trans. Reliab.), 2019
6 August 2019
Sakshi Udeshi
Shanshan Peng
Gerald Woo
Lionell Loh
Louth Rawshan
Sudipta Chattopadhyay
    AAML
ArXiv (abs)PDFHTML

Papers citing "Model Agnostic Defence against Backdoor Attacks in Machine Learning"

50 / 56 papers shown
Localizing Malicious Outputs from CodeLLM
Localizing Malicious Outputs from CodeLLM
Mayukh Borana
Junyi Liang
Sai Sathiesh Rajan
Sudipta Chattopadhyay
AAML
112
0
0
21 Sep 2025
NT-ML: Backdoor Defense via Non-target Label Training and Mutual Learning
NT-ML: Backdoor Defense via Non-target Label Training and Mutual Learning
Wenjie Huo
Katinka Wolter
AAML
132
0
0
07 Aug 2025
DeBackdoor: A Deductive Framework for Detecting Backdoor Attacks on Deep Models with Limited Data
DeBackdoor: A Deductive Framework for Detecting Backdoor Attacks on Deep Models with Limited Data
Dorde Popovic
Amin Sadeghi
Ting Yu
Sanjay Chawla
Issa M. Khalil
AAML
322
1
0
27 Mar 2025
Test-Time Backdoor Detection for Object Detection Models
Test-Time Backdoor Detection for Object Detection ModelsComputer Vision and Pattern Recognition (CVPR), 2025
Hangtao Zhang
Yichen Wang
Shihui Yan
Chenyu Zhu
Ziqi Zhou
Linshan Hou
Shengshan Hu
Minghui Li
Yanjun Zhang
L. Zhang
AAML
209
9
0
19 Mar 2025
AnywhereDoor: Multi-Target Backdoor Attacks on Object Detection
Jialin Lu
Junjie Shan
Ziqi Zhao
Ka-Ho Chow
AAML
439
2
0
09 Mar 2025
BackdoorMBTI: A Backdoor Learning Multimodal Benchmark Tool Kit for Backdoor Defense EvaluationKnowledge Discovery and Data Mining (KDD), 2024
Haiyang Yu
Tian Xie
Jiaping Gui
Pengyang Wang
P. Yi
Yue Wu
390
3
0
17 Nov 2024
Psychometrics for Hypnopaedia-Aware Machinery via Chaotic Projection of
  Artificial Mental Imagery
Psychometrics for Hypnopaedia-Aware Machinery via Chaotic Projection of Artificial Mental Imagery
Ching-Chun Chang
Kai Gao
Shuying Xu
Anastasia Kordoni
Christopher Leckie
Isao Echizen
180
0
0
29 Sep 2024
Sample-Independent Federated Learning Backdoor Attack in Speaker Recognition
Sample-Independent Federated Learning Backdoor Attack in Speaker RecognitionCluster Computing (CC), 2024
Weida Xu
Yang Xu
Sicong Zhang
FedMLAAML
323
2
0
25 Aug 2024
Evolutionary Trigger Detection and Lightweight Model Repair Based
  Backdoor Defense
Evolutionary Trigger Detection and Lightweight Model Repair Based Backdoor Defense
Qi Zhou
Zipeng Ye
Yubo Tang
Wenjian Luo
Yuhui Shi
Yan Jia
AAML
286
2
0
07 Jul 2024
A general approach to enhance the survivability of backdoor attacks by
  decision path coupling
A general approach to enhance the survivability of backdoor attacks by decision path coupling
Yufei Zhao
Dingji Wang
Bihuan Chen
Ziqian Chen
Xin Peng
AAML
224
0
0
05 Mar 2024
On the (In)feasibility of ML Backdoor Detection as an Hypothesis Testing
  Problem
On the (In)feasibility of ML Backdoor Detection as an Hypothesis Testing Problem
Georg Pichler
Marco Romanelli
Divya Prakash Manivannan
Prashanth Krishnamurthy
Farshad Khorrami
Siddharth Garg
162
4
0
26 Feb 2024
Preference Poisoning Attacks on Reward Model Learning
Preference Poisoning Attacks on Reward Model Learning
Junlin Wu
Zhenghao Hu
Chaowei Xiao
Chenguang Wang
Ning Zhang
Yevgeniy Vorobeychik
AAML
287
11
0
02 Feb 2024
BackdoorBench: A Comprehensive Benchmark and Analysis of Backdoor
  Learning
BackdoorBench: A Comprehensive Benchmark and Analysis of Backdoor LearningInternational Journal of Computer Vision (IJCV), 2024
Baoyuan Wu
Hongrui Chen
Ruotong Wang
Zihao Zhu
Shaokui Wei
Danni Yuan
Mingli Zhu
Ke Xu
Li Liu
Chaoxiao Shen
AAMLELM
281
19
0
26 Jan 2024
The Art of Deception: Robust Backdoor Attack using Dynamic Stacking of
  Triggers
The Art of Deception: Robust Backdoor Attack using Dynamic Stacking of Triggers
Orson Mengara
AAML
387
4
0
03 Jan 2024
UltraClean: A Simple Framework to Train Robust Neural Networks against Backdoor Attacks
UltraClean: A Simple Framework to Train Robust Neural Networks against Backdoor Attacks
Bingyin Zhao
Yingjie Lao
AAML
331
2
0
17 Dec 2023
Mitigating Backdoors within Deep Neural Networks in Data-limited
  Configuration
Mitigating Backdoors within Deep Neural Networks in Data-limited Configuration
Soroush Hashemifar
Saeed Parsa
Morteza Zakeri-Nasrabadi
AAML
189
0
0
13 Nov 2023
SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models
SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models
Boyang Zhang
Zheng Li
Ziqing Yang
Xinlei He
Michael Backes
Mario Fritz
Yang Zhang
346
8
0
19 Oct 2023
Stealthy Low-frequency Backdoor Attack against Deep Neural Networks
Stealthy Low-frequency Backdoor Attack against Deep Neural Networks
Xinrui Liu
Yu-an Tan
Yajie Wang
Kefan Qiu
Yuan-zhang Li
AAML
131
1
0
10 May 2023
Pick your Poison: Undetectability versus Robustness in Data Poisoning
  Attacks
Pick your Poison: Undetectability versus Robustness in Data Poisoning Attacks
Nils Lukas
Florian Kerschbaum
276
1
0
07 May 2023
Adversary Aware Continual Learning
Adversary Aware Continual LearningIEEE Access (IEEE Access), 2023
Muhammad Umer
R. Polikar
AAML
196
4
0
27 Apr 2023
Recover Triggered States: Protect Model Against Backdoor Attack in
  Reinforcement Learning
Recover Triggered States: Protect Model Against Backdoor Attack in Reinforcement Learning
Hao Chen
Chen Gong
Yizhen Wang
Xinwen Hou
AAML
274
3
0
01 Apr 2023
Detecting Backdoors During the Inference Stage Based on Corruption
  Robustness Consistency
Detecting Backdoors During the Inference Stage Based on Corruption Robustness ConsistencyComputer Vision and Pattern Recognition (CVPR), 2023
Xiaogeng Liu
Minghui Li
Haoyu Wang
Shengshan Hu
Dengpan Ye
Hai Jin
Libing Wu
Chaowei Xiao
AAML
200
56
0
27 Mar 2023
Mask and Restore: Blind Backdoor Defense at Test Time with Masked Autoencoder
Mask and Restore: Blind Backdoor Defense at Test Time with Masked Autoencoder
Tao Sun
Lu Pang
Chao Chen
Haibin Ling
Haibin Ling
AAML
343
0
0
27 Mar 2023
Black-box Backdoor Defense via Zero-shot Image Purification
Black-box Backdoor Defense via Zero-shot Image PurificationNeural Information Processing Systems (NeurIPS), 2023
Yucheng Shi
Mengnan Du
Xuansheng Wu
Zihan Guan
Jin Sun
Ninghao Liu
288
41
0
21 Mar 2023
Influencer Backdoor Attack on Semantic Segmentation
Influencer Backdoor Attack on Semantic SegmentationInternational Conference on Learning Representations (ICLR), 2023
Haoheng Lan
Jindong Gu
Juil Sock
Hengshuang Zhao
AAML
342
9
0
21 Mar 2023
Towards Understanding How Self-training Tolerates Data Backdoor
  Poisoning
Towards Understanding How Self-training Tolerates Data Backdoor Poisoning
Soumyadeep Pal
Ren Wang
Yuguang Yao
Sijia Liu
203
7
0
20 Jan 2023
XMAM:X-raying Models with A Matrix to Reveal Backdoor Attacks for
  Federated Learning
XMAM:X-raying Models with A Matrix to Reveal Backdoor Attacks for Federated Learning
Jianyi Zhang
Fangjiao Zhang
Qichao Jin
Zhiqiang Wang
Xiaodong Lin
X. Hei
AAMLFedML
192
2
0
28 Dec 2022
Learned-Database Systems Security
Learned-Database Systems Security
R. Schuster
Jinyi Zhou
Thorsten Eisenhofer
Paul Grubbs
Nicolas Papernot
AAML
408
2
0
20 Dec 2022
Fine-Tuning Is All You Need to Mitigate Backdoor Attacks
Fine-Tuning Is All You Need to Mitigate Backdoor Attacks
Zeyang Sha
Xinlei He
Pascal Berrang
Mathias Humbert
Yang Zhang
AAML
272
49
0
18 Dec 2022
Emerging Threats in Deep Learning-Based Autonomous Driving: A
  Comprehensive Survey
Emerging Threats in Deep Learning-Based Autonomous Driving: A Comprehensive Survey
Huiyun Cao
Wenlong Zou
Yinkun Wang
Ting Song
Mengjun Liu
AAML
243
6
0
19 Oct 2022
Confidence Matters: Inspecting Backdoors in Deep Neural Networks via
  Distribution Transfer
Confidence Matters: Inspecting Backdoors in Deep Neural Networks via Distribution Transfer
Tong Wang
Xingtai Lv
F. Xu
Miao Xu
Shengwei An
Ting Wang
AAML
164
3
0
13 Aug 2022
BackdoorBench: A Comprehensive Benchmark of Backdoor Learning
BackdoorBench: A Comprehensive Benchmark of Backdoor LearningNeural Information Processing Systems (NeurIPS), 2022
Baoyuan Wu
Hongrui Chen
Ruotong Wang
Zihao Zhu
Shaokui Wei
Danni Yuan
Chaoxiao Shen
ELMAAML
324
191
0
25 Jun 2022
Defending Backdoor Attacks on Vision Transformer via Patch Processing
Defending Backdoor Attacks on Vision Transformer via Patch ProcessingAAAI Conference on Artificial Intelligence (AAAI), 2022
Khoa D. Doan
Yingjie Lao
Peng Yang
Ping Li
AAML
238
27
0
24 Jun 2022
Measuring the Effect of Training Data on Deep Learning Predictions via
  Randomized Experiments
Measuring the Effect of Training Data on Deep Learning Predictions via Randomized ExperimentsInternational Conference on Machine Learning (ICML), 2022
Jinkun Lin
Anqi Zhang
Mathias Lécuyer
Jinyang Li
Aurojit Panda
S. Sen
TDIFedML
217
63
0
20 Jun 2022
Contributor-Aware Defenses Against Adversarial Backdoor Attacks
Contributor-Aware Defenses Against Adversarial Backdoor Attacks
Glenn Dawson
Muhammad Umer
R. Polikar
AAML
120
0
0
28 May 2022
Towards A Proactive ML Approach for Detecting Backdoor Poison Samples
Towards A Proactive ML Approach for Detecting Backdoor Poison SamplesUSENIX Security Symposium (USENIX Security), 2022
Xiangyu Qi
Tinghao Xie
Jiachen T. Wang
Tong Wu
Saeed Mahloujifar
Prateek Mittal
AAML
356
69
0
26 May 2022
Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free
Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for FreeComputer Vision and Pattern Recognition (CVPR), 2022
Tianlong Chen
Zhenyu Zhang
Yihua Zhang
Shiyu Chang
Sijia Liu
Zinan Lin
AAML
201
28
0
24 May 2022
Trojan Horse Training for Breaking Defenses against Backdoor Attacks in
  Deep Learning
Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning
Arezoo Rajabi
Bhaskar Ramasubramanian
Radha Poovendran
AAML
235
5
0
25 Mar 2022
Sniper Backdoor: Single Client Targeted Backdoor Attack in Federated
  Learning
Sniper Backdoor: Single Client Targeted Backdoor Attack in Federated Learning
Gorka Abad
Servio Paguada
Oguzhan Ersoy
S. Picek
Víctor Julio Ramírez-Durán
A. Urbieta
FedML
207
9
0
16 Mar 2022
A Survey of Neural Trojan Attacks and Defenses in Deep Learning
A Survey of Neural Trojan Attacks and Defenses in Deep Learning
Jie Wang
Ghulam Mubashar Hassan
Naveed Akhtar
AAML
192
27
0
15 Feb 2022
AntidoteRT: Run-time Detection and Correction of Poison Attacks on
  Neural Networks
AntidoteRT: Run-time Detection and Correction of Poison Attacks on Neural Networks
Muhammad Usman
Youcheng Sun
D. Gopinath
C. Păsăreanu
AAML
123
1
0
31 Jan 2022
Identifying a Training-Set Attack's Target Using Renormalized Influence
  Estimation
Identifying a Training-Set Attack's Target Using Renormalized Influence EstimationConference on Computer and Communications Security (CCS), 2022
Zayd Hammoudeh
Daniel Lowd
TDI
283
38
0
25 Jan 2022
CatchBackdoor: Backdoor Detection via Critical Trojan Neural Path
  Fuzzing
CatchBackdoor: Backdoor Detection via Critical Trojan Neural Path FuzzingEuropean Conference on Computer Vision (ECCV), 2021
Haibo Jin
Ruoxi Chen
Jinyin Chen
Haibin Zheng
Andy Zhou
Haohan Wang
AAML
290
2
0
24 Dec 2021
Towards Practical Deployment-Stage Backdoor Attack on Deep Neural
  Networks
Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks
Xiangyu Qi
Tinghao Xie
Ruizhe Pan
Jifeng Zhu
Yong-Liang Yang
Kai Bu
AAML
254
73
0
25 Nov 2021
Backdoor Attack through Frequency Domain
Backdoor Attack through Frequency Domain
Tong Wang
Xingtai Lv
Feng Xu
Shengwei An
Hanghang Tong
Ting Wang
AAML
261
41
0
22 Nov 2021
Textual Backdoor Attacks Can Be More Harmful via Two Simple Tricks
Textual Backdoor Attacks Can Be More Harmful via Two Simple Tricks
Yangyi Chen
Fanchao Qi
Hongcheng Gao
Zhiyuan Liu
Maosong Sun
SILM
183
23
0
15 Oct 2021
De-Pois: An Attack-Agnostic Defense against Data Poisoning Attacks
De-Pois: An Attack-Agnostic Defense against Data Poisoning AttacksIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2021
Jian Chen
Xuxin Zhang
Rui Zhang
Chen Wang
Ling Liu
AAML
165
103
0
08 May 2021
MISA: Online Defense of Trojaned Models using Misattributions
MISA: Online Defense of Trojaned Models using MisattributionsAsia-Pacific Computer Systems Architecture Conference (ACSA), 2021
Panagiota Kiourti
Wenchao Li
Anirban Roy
Karan Sikka
Susmit Jha
268
10
0
29 Mar 2021
TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural
  Backdoors
TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural BackdoorsEuropean Symposium on Security and Privacy (EuroS&P), 2020
Ren Pang
Zheng Zhang
Xiangshan Gao
Zhaohan Xi
S. Ji
Peng Cheng
Xiapu Luo
Ting Wang
AAML
418
45
0
16 Dec 2020
Privacy and Robustness in Federated Learning: Attacks and Defenses
Privacy and Robustness in Federated Learning: Attacks and Defenses
Lingjuan Lyu
Han Yu
Jiabo He
Chen Chen
Lichao Sun
Jun Zhao
Qiang Yang
Philip S. Yu
FedML
611
479
0
07 Dec 2020
12
Next
Page 1 of 2